The Environmental Protection Agency’s inspector general has launched a new investigation into conduct at storage facilities, following findings of “deplorable conditions” at an EPA warehouse in May.

“As a result of our findings, we are conducting an additional, comprehensive audit at other selected warehouse spaces,” EPA IG Arthur Elkins said.

In its original report, the IG office found secret rooms full of exercise equipment, televisions and couches, as well as numerous potential security and safety hazards, corrosion, vermin feces and pervasive mold. The Landover, Md., warehouse was operated by contractors.

An EPA spokeswoman said the agency has already conducted its own separate reviews and found no other problems.

“During this review, we noted no circumstances that required any review of other contracts or contractors,” the spokeswoman told Government Executive. “The conditions of concern identified at the Landover warehouse do not exist at any other agency warehouse or storage facility, and we will ensure that those conditions do not recur at an EPA facility.”

The inspector general said in a statement he plans to push forward with his investigation.

“My office will continue its efforts to prevent and detect fraud, waste and abuse in the EPA’s programs and operations,” Elkins said. “If the OIG does not provide this level of transparency into agency programs and operations, who will?”

Elkins’ office has not yet completed its investigation, and will not release any further details until it has conducted a full review.

“At this point, I cannot disclose any findings about the current review,” said Jeffrey Lagda, a spokesman for the IG. “It is still in a preliminary stage, so a timeframe for the audit has not yet been estimated.”

By using this service you agree not to post material that is obscene, harassing, defamatory, or
otherwise objectionable. Although GovExec.com does not monitor comments posted to this site (and
has no obligation to), it reserves the right to delete, edit, or move any material that it deems
to be in violation of this rule.

Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.